Sciweavers

1324 search results - page 175 / 265
» Automation Controller for Operational IT Management
Sort
View
CCS
2007
ACM
14 years 3 months ago
Specifying and analyzing security automata using CSP-OZ
Security automata are a variant of B¨uchi automata used to specify security policies that can be enforced by monitoring system execution. In this paper, we propose using CSP-OZ, ...
David A. Basin, Ernst-Rüdiger Olderog, Paul E...
HAPTICS
2005
IEEE
14 years 2 months ago
Force Feedback Interface for Cell Injection
Manual pronuclei injection and intracytoplasmic sperm injection (ICSI) requires long training and has low success rates primarily due to poor control over the injection force. Con...
Anand Pillarisetti, Waqas Anjum, Jaydev P. Desai, ...
ACNS
2004
Springer
77views Cryptology» more  ACNS 2004»
14 years 2 months ago
A Pay-per-Use DoS Protection Mechanism for the Web
Internet service providers have resisted deploying Denial-of-Service (DoS) protection mechanisms despite numerous research results in the area. This is so primarily because ISPs ca...
Angelos Stavrou, John Ioannidis, Angelos D. Keromy...
CSL
2004
Springer
14 years 2 months ago
Axioms for Delimited Continuations in the CPS Hierarchy
A CPS translation is a syntactic translation of programs, which is useful for describing their operational behavior. By iterating the standard call-by-value CPS translation, Danvy ...
Yukiyoshi Kameyama
IM
2003
13 years 10 months ago
Facilitating Efficient and Reliable Monitoring through HAMSA
: Monitoring is a fundamental building block of any network management system. It is needed to ensure that the network operates within the required parameters, and to account for u...
David Breitgand, Danny Dolev, Danny Raz, Gleb Shav...